exim критическая уязвимость

iBBi
На сайте с 13.02.2007
Offline
314
1524

Для тех кто не следить за новостями - пора обновлять т.к. можем потерять рута.

http://www.exim.org/lurker/message/20101210.164935.385e04d0.en.html

http://www.webhostingtalk.com/showthread.php?t=1004670

ну и по русски http://opennet.ru/opennews/art.shtml?num=28945

Продукты ispsystem по минимальным ценам (http://www.isplicense.ru/?from=4926)
Romka_Kharkov
На сайте с 08.04.2009
Offline
485
#1

Для тех кто платит за апдейты cPanel:


http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html

Summary
-----------------------

A memory corruption vulnerability exists in Exim versions 4.69 and older (CVE-2010-4344). Exim is the mail transfer agent used by cPanel & WHM.

Security Rating
-----------------------

This update has been rated as Important by the cPanel Security team.

Description
-----------------------

A memory corruption vulnerability has been discovered in Exim. This vulnerability may lead to arbitrary code execution with the privileges of the user executing the Exim daemon. cPanel previously released RPMs that mitigated the severity of the vulnerability on December 9, 2010 (CVE-2010-4345). This notification is for the release of new RPMs which remove the remote memory corruption vulnerability in its entirety. The vulnerability relies upon "rejected_header" being enabled (default setting) in the log_selector configuration.

Solution
-----------------------

To resolve and work around the issue on Linux systems, cPanel has issued new Exim RPMs. Server Owners are strongly urged to upgrade to the following Exim RPM versions:

Systems configured to use Maildir: Exim 4.69-26

Systems configured to use mbox (deprecated): Exim 4.63-5

Exim RPMs will be distributed through cPanel's package management system. All cPanel & WHM servers receiving updates automatically will receive the updated Exim RPM during normal update and maintenance operations (upcp). To begin an Exim update on cPanel systems immediately, run the following command as root:

/scripts/eximup

FreeBSD systems should be running Exim 4.72 by default, which is not affected by this issue.

FAQ
-----------------------

This notification covers CVE-2010-4344.

The notification release earlier on December 10, 2010 with the summary "A privilege escalation vulnerability exists in Exim, the mail transfer agent used by cPanel & WHM." covers CVE-2010-4345. At the time of the earlier announcement, the CVE had not been assigned.

References
-----------------------

Critical: Exim security update (CVE-2010-4345) - cPanel Inc.
http://www.cpanel.net/2010/12/critical-exim-security-update.html

Official Record CVE-2010-4344
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344

Debian Bug Report for CVE-2010-4344
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612

[exim-dev] Remote root vulnerability in Exim
http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html

Re: [exim-dev] Remote root vulnerability in Exim
http://www.exim.org/lurker/message/20101210.164935.385e04d0.en.html
_______________________________________________
News mailing list
News@cpanel.net
http://mail.cpanel.net/mailman/listinfo/news_cpanel.net

Но это я получил еще 11го числа в 5 утра....

Есть около 15.000 ipv4 !!! (http://onyx.net.ua/price.php#ipv4) Качественный хостинг с 2005 года - лучшее клиентам! (http://onyx.net.ua/)
[umka]
На сайте с 25.05.2008
Offline
456
#2

То-то... не один же постфикс хаять... :)

Лог в помощь!
M
На сайте с 01.12.2009
Offline
235
#3

Идеальной системы нет.

Администратор Linux,Freebsd. построения крупных проектов.
iBBi
На сайте с 13.02.2007
Offline
314
#4
madoff:
Идеальной системы нет.

есть, но не у человечества 🤣

M
На сайте с 01.12.2009
Offline
235
#5
iBBi:
есть, но не у человечества 🤣

Всегда будет противовес, это бесконечная борьба. 🤣

Zaqwr
На сайте с 08.08.2007
Offline
111
#6

сегодня в exim нашли, завтра в postfix найдут... главное чтоб вовремя прикрыть "тылы" )

Администрирование, Linux, Cisco, Juniper

Авторизуйтесь или зарегистрируйтесь, чтобы оставить комментарий